Skip to content

Commit cd0c4d2

Browse files
committed
Remove SFI incompliant images
1 parent 0e061e3 commit cd0c4d2

File tree

5 files changed

+0
-22
lines changed

5 files changed

+0
-22
lines changed

articles/app-service/environment/app-service-app-service-environment-network-architecture-overview.md

Lines changed: 0 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -61,27 +61,10 @@ If the endpoint being called is **inside** of the virtual network topology, the
6161

6262
However, since an App Service Environment is always located within a subnet, you're guaranteed that the internal IP address of a compute resource running an app will always lie within the CIDR range of the subnet. As a result, when fine-grained ACLs or network security groups are used to secure access to other endpoints within the virtual network, the subnet range containing the App Service Environment needs to be granted access.
6363

64-
The following diagram shows these concepts in more detail:
65-
66-
![Outbound Network Addresses][OutboundNetworkAddresses]
67-
68-
In the above diagram:
69-
70-
* Since the public VIP of the App Service Environment is 192.23.1.2, that is the outbound IP address used when making calls to "Internet" endpoints.
71-
* The CIDR range of the containing subnet for the App Service Environment is 10.0.1.0/26. Other endpoints within the same virtual network infrastructure will see calls from apps as originating from somewhere within this address range.
72-
7364
## Calls Between App Service Environments
7465

7566
A more complex scenario can occur if you deploy multiple App Service Environments in the same virtual network, and make outbound calls from one App Service Environment to another App Service Environment. These types of cross App Service Environment calls will also be treated as "Internet" calls.
7667

77-
The following diagram shows an example of a layered architecture with apps on one App Service Environment (for example "Front door" web apps) calling apps on a second App Service Environment (for example internal back-end API apps not intended to be accessible from the Internet).
78-
79-
![Calls Between App Service Environments][CallsBetweenAppServiceEnvironments]
80-
81-
In the example above the App Service Environment "ASE One" has an outbound IP address of 192.23.1.2. If an app running on this App Service Environment makes an outbound call to an app running on a second App Service Environment ("ASE Two") located in the same virtual network, the outbound call will be treated as an "Internet" call. As a result the network traffic arriving on the second App Service Environment will show as originating from 192.23.1.2 (that is, not the subnet address range of the first App Service Environment).
82-
83-
Even though calls between different App Service Environments are treated as "Internet" calls, when both App Service Environments are located in the same Azure region the network traffic will remain on the regional Azure network and won't physically flow over the public Internet. As a result you can use a network security group on the subnet of the second App Service Environment to only allow inbound calls from the first App Service Environment (whose outbound IP address is 192.23.1.2), thus ensuring secure communication between the App Service Environments.
84-
8568
## Additional Links and Information
8669

8770
Details on inbound ports used by App Service Environments and using network security groups to control inbound traffic is available [here][controllinginboundtraffic].
@@ -96,5 +79,3 @@ Details on using user-defined routes to grant outbound Internet access to App Se
9679
<!-- IMAGES -->
9780
[GeneralNetworkFlows]: ./media/app-service-app-service-environment-network-architecture-overview/NetworkOverview-1.png
9881
[OutboundIPAddress]: ./media/app-service-app-service-environment-network-architecture-overview/OutboundIPAddress-1.png
99-
[OutboundNetworkAddresses]: ./media/app-service-app-service-environment-network-architecture-overview/OutboundNetworkAddresses-1.png
100-
[CallsBetweenAppServiceEnvironments]: ./media/app-service-app-service-environment-network-architecture-overview/CallsBetweenEnvironments-1.png

articles/app-service/environment/network-info.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -219,8 +219,6 @@ To create the same routes manually, follow these steps:
219219

220220
5. After you create the new route table, go to the subnet. Select your route table from the list in the portal. After you save the change, you should then see the NSGs and routes noted with your subnet.
221221

222-
![Screenshot that shows NSGs and routes.][7]
223-
224222
## Service endpoints
225223

226224
Service endpoints enable you to restrict access to multi-tenant services to a set of Azure virtual networks and subnets. For more information, see [Virtual Network service endpoints][serviceendpoints].
@@ -235,7 +233,6 @@ When service endpoints are enabled on a subnet with an instance of Azure SQL, al
235233
[1]: ./media/network_considerations_with_an_app_service_environment/networkase-overflow.png
236234
[2]: ./media/network_considerations_with_an_app_service_environment/networkase-overflow2.png
237235
[6]: ./media/network_considerations_with_an_app_service_environment/networkase-udr.png
238-
[7]: ./media/network_considerations_with_an_app_service_environment/networkase-subnet.png
239236
[8]: ./media/network_considerations_with_an_app_service_environment/serviceendpoint.png
240237

241238
<!--Links-->

0 commit comments

Comments
 (0)